Computer Networking On a VLSM network, which mask should you use on point-to-point WAN links in order to reduce the waste of IP addresses? /28 /27 /29 /30 /28 /27 /29 /30 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Four bits are used for packet sequence numbering in a sliding window protocol used in a computer network. What is the maximum window size? None of these 15 4 16 8 None of these 15 4 16 8 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as Checksum Error detecting code Error rate None of these Cyclic redundancy check Checksum Error detecting code Error rate None of these Cyclic redundancy check ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command loads a new version of the Cisco IOS into a router? copy ftp flash copy tftp flash copy flash tftp copy flash ftp copy ftp flash copy tftp flash copy flash tftp copy flash ftp ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When using the loopback address, if TCP/IP is installed correctly, when should you receive a response? Immediately Within two minutes Only if the address fails After the next host comes online None of these Immediately Within two minutes Only if the address fails After the next host comes online None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following describe the DHCP Discover message?1. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.2. It uses UDP as the Transport layer protocol.3. It uses TCP as the Transport layer protocol.4. It does not use a layer 2 destination address. 1 only 4 only 1 and 2 3 and 4 1 only 4 only 1 and 2 3 and 4 ANSWER DOWNLOAD EXAMIANS APP